D-Link DI-707P Product Manual - Page 8

Introduction to Virtual Private Networking, Point-to-Point Tunneling Protocol PPTP, IP Security - vpn

Page 8 highlights

Introduction to Virtual Private Networking Virtual Private Networking (VPN) uses a publicly wired network (the Internet) to securely connect two different networks as if they were the same network. For example, an employee can access the corporate network from home using VPN, allowing the employee to access files and printers. Here are several different implementations of VPN that can be used. Point-to-Point Tunneling Protocol (PPTP) PPTP uses proprietary means of connecting two private networks over the Internet. PPTP is a way of securing the information that is communicated between networks. PPTP secures information by encrypting the data inside of a packet. IP Security (IPSec) IPSec provides a more secure network-to-network connection across the Internet or a Wide Area Network (WAN). IPSec encrypts all communication between the client and the server whereas PPTP only encrypts the data packets. Both of these VPN implementations are used because there is not a standard for VPN server software. Because of this, each ISP or business can implement its own VPN network making interoperability a challenge. 8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109

8
Introduction to Virtual Private Networking
Virtual Private Networking (VPN) uses a publicly wired network (the Internet) to securely
connect two different networks as if they were the same network. For example, an em-
ployee can access the corporate network from home using VPN, allowing the employee
to access files and printers. Here are several different implementations of VPN that can
be used.
Point-to-Point Tunneling Protocol (PPTP)
PPTP uses proprietary means of connecting two private networks over the Internet. PPTP
is a way of securing the information that is communicated between networks. PPTP
secures information by encrypting the data inside of a packet.
IP Security (IPSec)
IPSec provides a more secure network-to-network connection across the Internet or a
Wide Area Network (WAN). IPSec encrypts all communication between the client and
the server whereas PPTP only encrypts the data packets.
Both of these VPN implementations are used because there is not a standard for VPN
server software. Because of this, each ISP or business can implement its own VPN
network making interoperability a challenge.